Xem 1-20 trên 56 kết quả Niit
  • Collaborate Chapter 2 Knowledge Byte In this section, you will learn about: Functions to customize the result set in SQL Server 2005 Using Functions to Customize the Result Set Read the following section of Chapter 2 of the book Querying and Managing Data Using SQL Server 2005: Using Functions to Customize the Result Set NIIT Querying, Managing, and Administering Databases Using SQL Server 2005 2.

    pdf8p tienphuoconline 13-05-2011 38 10   Download

  • Instructor Inputs Session 2 Session Overview This session includes the following topics: Functions to customize the result set in SQL Server 2005 Best practices Tips and Tricks FAQs Slide 1 Installing Windows and Administering Databases Using SQL Server 2005 Querying, Managing,XP Professional Using Attended Installation Objectives In this session, you will learn about: Functions to customize the result set in SQL Server 2005 Best Practices while using procedures and functions in SQL Server 2005 Tips and Tricks that will help you use functions in SQL Server 2005 FAQs related to general ...

    pdf18p tienphuoconline 13-05-2011 48 5   Download

  • In the network model, data is represented using a collection of records. The records are related to each other using links. Each record consists of fields and each field contains a single data value. A data structure diagram can be used to represent the design of a network model.

    pdf36p tienphuoconline 03-05-2011 54 3   Download

  • A domain is a set of data values that are of the same type. Every value in an attribute must be drawn from the underlying domain. However, every value in the domain may not appear in the table. Domains are primarily conceptual and no current RDBMS supports this concept in the complete sense. A relation is a collection of domains and consists of two parts, a heading and a body.

    pdf42p tienphuoconline 03-05-2011 52 2   Download

  • Ứng dụng công nghệ thông tin vào công tác quản trị dây chuyền cung ứng trong các doanh nghiệp sản xuất. Nguyễn Bá Minh Trung tâm công nghệ thông tin

    pdf0p minhhuy 14-03-2009 389 158   Download

  • Cùng với sự phát triển kinh tế toàn cầu, CNTT ngày càng đóng vai trò quan trọng hơn trong việc tích hợp các nhu cầu toàn cầu hóa khác nhau đã dẫn đến sự nổi lên của nhiều công nghệ đa dạng. Do đó, đang có nhu cầu rất lớn về các chuyên gia trong từng lĩnh vực cụ thể như công nghệ phát triển phần mềm, công nghệ mạng, cơ sở dữ liệu và bảo vệ hệ thống thông tin tại Việt Nam cũng như trên thế giới.

    pdf64p coxetuanloc 07-01-2013 123 47   Download

  • Tốc độ phát triển nhanh chóng của công nghệ thông tin như hiện nay đã kéo theo sự phát triển nhanh của rất nhiều lĩnh vực khác trong xã hội như: kinh tế, văn hóa, xã hội, chính trị,… làm thay đổi toàn diện bộ mặt kinh tế, xã hội theo xu hướng “thời đại số”.

    pdf78p coxetuanloc 07-01-2013 85 30   Download

  • Entities do not exist in isolation. They have some type of relationship with each other. Similarly, in C#, the classes in a program can be related to each other. Identifying and establishing relationships between classes is a critical aspect of OOP. This chapter identifies the relationship between classes. It discusses the use of classes and inheritance. In addition, this chapter discusses the use of abstract classes, sealed classes, and interfaces.

    pdf28p tienphuoconline 03-05-2011 87 16   Download

  • In this lesson, you will learn to: Define a Database Management System (DBMS) Identify the different DBMS users Describe the need for a database system Define the architecture of a DBMS in terms of: External level Define a Database Management System (DBMS) Identify the components of a DBMS Describe the need for a database system Define the architecture of a DBMS in terms of: • External level • Conceptual level .

    pdf28p tienphuoconline 03-05-2011 54 12   Download

  • A program executes as a single, sequential flow of control. A program can also be designed to execute multiple tasks. To execute multiple tasks in your program, you can use threads. This chapter discusses implementation of threads and their life cycle. The chapter also discusses implementing multiple threads and prioritizing threads. In addition, this chapter discusses thread synchronization and communication between processes.

    pdf38p tienphuoconline 03-05-2011 44 12   Download

  • Attributes are a simple technique for adding metadata information and behavior to code within applications. You use the reflection technique to pick the attribute related information at runtime. This chapter introduces attributes and reflection and the functions they perform in C# applications. This chapter discusses attribute syntax, and how to use some of the predefined attributes. This chapter discusses also discusses how to create customized user-defined attributes. In addition, this chapter discusses reflection and how to use it to extract attribute related information. ...

    pdf24p tienphuoconline 03-05-2011 71 11   Download

  • Objects contain data and methods to send and receive messages. Data members of objects can have a different scope or visibility. You use access specifier to define the scope of data member and method. This chapter introduces the concept of abstraction and encapsulation. It discusses the implementation of encapsulation by using access specifiers. It also explains the concept of using methods. In addition, the chapter also discusses the static variables and static functions.

    pdf34p tienphuoconline 03-05-2011 76 11   Download

  • The variables in a program are allocated memory at run time in the system. In C#, variables are referred in two ways, value type and reference type. Value type variables contain data, whereas reference type variables hold the reference to the memory location where data is stored.

    pdf32p tienphuoconline 03-05-2011 54 11   Download

  • Polymorphism is the ability that helps in executing different operations in response to the same message. In OOP, you can implement polymorphism by creating more than one function within a class that have the same name. The difference in the functions lies in the number and the types of parameters passed to each function. This chapter introduces the concept of polymorphism. It explains how to implement function overloading and operator overloading.

    pdf32p tienphuoconline 03-05-2011 80 11   Download

  • Object-Oriented Programming (OOP) is one of the most popular methodologies in software development. It offers a powerful model for creating computer programs. It speeds the program development process, improves maintenance, and enhances reusability of programs. This chapter introduces object-oriented methodology and discusses the concepts of objects, classes, messages, and methods. It provides an overview of the phases involved in object-oriented analysis and design.

    pdf24p tienphuoconline 03-05-2011 54 10   Download

  • Operators are used to compute results and compare the data values of a program. A program often involves decision-making and iterative tasks. To accomplish these tasks, programmers use various operators in the conditional and looping constructs. This chapter discusses the types of operators used in C# language. In addition, the conditional constructs and the looping constructs are also discussed.

    pdf30p tienphuoconline 03-05-2011 58 9   Download

  • The .NET Framework enables you to create robust and scalable applications. The .NET Framework consists of Common Language Runtime, Common Language Specification, and the Just-In-Time compiler. Before you can use Visual Studio .NET for creating a console-based application, you need to understand the .NET Framework and the Visual Studio .NET Integrated Development Environment. This chapter introduces the features and components of the .NET Framework.

    pdf22p tienphuoconline 03-05-2011 62 9   Download

  • The lesson introduces the concept of mapping E/R diagrams to tables with respect to regular entities, weak entities, relationships, attributes, subtypes, and supertypes. This lesson also contains tips for logical database design and covers the various types of keys and their applications.

    pdf30p tienphuoconline 03-05-2011 67 8   Download

  • In this section, you will learn to: Describe the Top-down and Bottom-up approach Describe data redundancy Describe the first, second, and third normal forms Describe the Boyce-Codd Normal Form (BCNF) Appreciate the need for denormalization

    pdf36p tienphuoconline 03-05-2011 52 8   Download

  • In this section, you will learn to: Describe Transaction Processing Describe Transaction Recovery Define Transaction Log Identify the Concurrency Problems Identify the Types of Locks Define a Deadlock Describe the Security Scheme Concepts Establish the Security Scheme.

    pdf40p tienphuoconline 03-05-2011 57 8   Download


Đồng bộ tài khoản